14.01.2013 Views

Tactical Edge Characterization Framework: Volume 3 ... - Mitre

Tactical Edge Characterization Framework: Volume 3 ... - Mitre

Tactical Edge Characterization Framework: Volume 3 ... - Mitre

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

MTR080310<br />

MITRE TECHNICAL REPO RT<br />

<strong>Tactical</strong> <strong>Edge</strong> <strong>Characterization</strong> <strong>Framework</strong><br />

<strong>Volume</strong> 3: Evolution and Application of the<br />

<strong>Framework</strong><br />

September 2008<br />

Dr. Fatma Dandashi<br />

Dr. Priscilla Glasow<br />

Dr. David Kaplan<br />

Weber Lin<br />

Salim Semy<br />

Jennifer Valentine<br />

Dr. Beth Yost<br />

Sponsor: OSD (NII) Contract No.: W15P7T-08-C-F600<br />

Dept. No.: E543 Project No.: 0708ECSE-DA<br />

The views, opinions and/or findings contained in this report are those of<br />

The MITRE Corporation and should not be construed as an official<br />

Government position, policy, or decision, unless designated by other<br />

documentation.<br />

2008 The MITRE Corporation. All Rights Reserved.<br />

Approved for Public Release; Distribution Unlimited<br />

Case Number: 09-0166


Executive Summary<br />

Many approaches commonly used to develop a Service-Oriented Environment (SOE) presume<br />

the availability of reliable, consistently available networks that provide significant bandwidth<br />

and little to no latency. Since this is often not the case across the Department of Defense’s (DoD)<br />

networks, the current development methods might not provide reliable capability to users in a<br />

<strong>Tactical</strong> <strong>Edge</strong> (TE) environment. 1 This Enterprise Systems Engineering (ESE) Capstone activity<br />

aims to ensure the viability of a SOE to a broader domain of tactical users by gaining a better<br />

understanding of the TE and quantifying its characteristics.<br />

During Fiscal Year (FY) 2007, the ESE Capstone activity developed a <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

(TEF). The primary objectives of the TEF are 1) to provide a classification of disadvantaged<br />

users (i.e., users operating in a TE environment), and 2) to provide a common vocabulary to<br />

characterize TE environments. The common vocabulary allows the TE characteristics to be<br />

quantified and solutions to be identified to explicitly address the quantified characteristics. As<br />

the DoD’s components deliver services to the TE, the TEF’s common vocabulary and use of<br />

consistent solutions will promote interoperability across component-specific implementations.<br />

The TEF was documented in two papers; “Common Vocabulary for <strong>Tactical</strong> Environments”,<br />

which defines a common vocabulary that identifies classes of disadvantaged users at the TE and<br />

characterizes their environments as a set of constraints [2], and “Design Patterns for <strong>Tactical</strong><br />

Environments,”, which describes a set of repeatable solutions (i.e., design patterns) to mitigate<br />

the common TE constraints [3].<br />

The focus of the FY 2008 activity was to socialize the TEF and facilitate its transition to the<br />

DoD. The socialization of the TEF across the DoD’s components and the component’s<br />

commands resulted in the validation and evolution of the TEF. The TEF’s evolution included<br />

incorporating Central Command’s (CENTCOM) characterization of the tactical edge into the<br />

TEF, as described by the “Disadvantaged User” white paper, and tailoring the TEF to better<br />

incorporate the DoD’s component-specific perspectives of the TE. Furthermore, the common<br />

vocabulary from the TEF was aligned with authoritative definitions of terms from joint<br />

publications based on work completed by the Core Enterprise Services to the <strong>Tactical</strong> <strong>Edge</strong><br />

(CESTE) Focus Group.<br />

Another focus of the FY 2008 activity was to apply the TEF across multiple DoD programs to<br />

demonstrate its value. The TEF was applied throughout the service acquisition lifecycle, from<br />

the collection of users’ requirements, to documenting use cases, to the design and development<br />

of a service. TEF’s applicability was also demonstrated in managing the portfolio of services at<br />

the TE. The TEF was employed by:<br />

Special Operations Command’s (SOCOM) <strong>Tactical</strong> Local Area Network in interviewing<br />

users at <strong>Tactical</strong> Special Operations Centers to collect functional requirements and usage<br />

patterns.<br />

1 <strong>Tactical</strong> edge is defined by Defense Information Systems Agency (DISA) as anything beyond the Defense Information Systems<br />

Network Point-of-Presence.<br />

iii


Net-Enabled Command Capability (NECC) program office to characterize Disconnected,<br />

Intermittent, and Limited environments.<br />

CESTE Focus Group to develop Performance and Service Reference Models and<br />

departmental guidance for delivering Core Enterprise Services into and throughout the<br />

TE.<br />

Net-Centric Enterprise Solutions for Interoperability (NESI) to define characteristics of<br />

TEF classes of environments’ such that relevant and tailored NESI guidance and best<br />

practices can be identified for each class of TE environment.<br />

As we reflect on the lessons learned from the ESE Capstone activity and consider future setups<br />

to support the realization of services to the TE, we believe that use of the TEF should be further<br />

institutionalized at a departmental level. In support of this, we recommend the following:<br />

Joint Staff and doctrinal leads from the components should adopt the TEF to establish<br />

DoD-wide definitions for the classes of TE environments and use the TEF’s common<br />

vocabulary to characterize them.<br />

The DoD Chief Information Officer and the Net-Centric (NC), Command and Control,<br />

and Battlespace Awareness Capability Portfolio Managers should employ the TEF to<br />

define Service and Performance Reference Models in order to establish an NC Enterprise<br />

Architecture.<br />

Defense Information Systems Agency’s Net-Centric Enterprise Services and NECC, in<br />

conjunction with the DoD’s component-specific Programs of Record developing<br />

enterprise services (e.g., Consolidated Afloat Networks and Enterprise Services, Army<br />

System-Of-Systems Common Operating Environment, Marine Corps Enterprise<br />

Information Technology Services, and Air Force’s Air and Space Operations Center as a<br />

Weapon System) should use the TEF to define and document interfaces and design<br />

patterns to achieve federation and meet Quality of Service requirements across DoD<br />

component-specific TE platforms.<br />

The adoption of a common characterization of the TE and the use of consistent design patterns<br />

will minimize the architectural differences across the DoD’s components and promote<br />

interoperability across component-specific service implementations at the TE.<br />

iv


Acknowledgements<br />

This work is the result of the contributions of many people across MITRE. We would like to<br />

thank the following people for their participation in this project:<br />

Frank Petroski and John McNamara for their leadership and guidance throughout the<br />

project.<br />

Francis Driscoll for his leadership and guidance to socialize the TEF across the Navy’s<br />

programs.<br />

Susan Cohn, Daniel Potter, Karen Carten, Amin Shaikh, Mark Troutt, and Michael Kazin<br />

for developing the website.<br />

Jeffrey Higginson and Marwan Sabbouh for providing valuable input as consultants<br />

throughout the project.<br />

Bruce Binney for his support to employ the TEF as part of the Navy’s Net-Enabled<br />

Command Capability Component Program Management Office activities.<br />

David Edwards for his collaboration in harmonizing the TEF with Central Command’s<br />

“Disadvantaged User” white paper (working with Kris Newport and Robert Lee),<br />

socializing the TEF within the Special Operations Command community, and using the<br />

TEF as part of the <strong>Tactical</strong> Local Area Network program.<br />

Bradford Mercer and Kenneth Griesi for their collaboration in providing the Navy’s input<br />

to evolve the TEF and using the TEF within the Consolidated Afloat Networks and<br />

Enterprise Services program.<br />

John Michitson, James Kennedy, and Lynne Spruill for their collaboration in<br />

incorporating the TEF into Net-Centric Enterprise Solutions for Interoperability.<br />

David Miller and Janet Manu for their collaboration in socializing the TEF with the Core<br />

Enterprise Services to the <strong>Tactical</strong> <strong>Edge</strong> Focus Group.<br />

Colin Valentine, Robert Pitsko, Jeremy Brady, and Richard Sparshatt for providing the<br />

Army’s input to evolve the TEF.<br />

v


Table of Contents<br />

1. Introduction ............................................................................................................................. 2<br />

2. The <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ................................................................................................ 3<br />

2.1 Common Vocabulary ............................................................................................................ 3<br />

2.2 Classes of <strong>Tactical</strong> <strong>Edge</strong> Environments ................................................................................ 4<br />

3. Evolution of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ............................................................................ 5<br />

3.1 Harmonizing With the Central Command Representation ................................................... 5<br />

3.2 Tailoring the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ............................................................................... 6<br />

3.2.1 Process of Tailoring the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ....................................................... 7<br />

3.2.2 Results of Tailoring the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ....................................................... 7<br />

3.2.3 Implications of Tailoring the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ............................................... 8<br />

4. Applications of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ....................................................................... 9<br />

4.1 Collect User Requirements ................................................................................................. 10<br />

4.2 Develop Mission Threads ................................................................................................... 11<br />

4.3 Identify Design Patterns ...................................................................................................... 11<br />

4.4 Identify Services ................................................................................................................. 12<br />

4.5 Identify Technology Standards and Best Practices ............................................................. 12<br />

4.6 Support Service Acquisition ............................................................................................... 13<br />

4.7 Support Portfolio management ........................................................................................... 13<br />

5. <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> Website ....................................................................................... 13<br />

6. Conclusions and Recommendations ..................................................................................... 15<br />

7. References ............................................................................................................................. 16<br />

Appendix A: Harmonization of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> and Central Command’s<br />

“Disadvantaged User” White Paper .............................................................................................. 17<br />

Appendix B: Authoritative Definitions of Common Vocabulary Terms...................................... 18<br />

Appendix C: Cross Referencing Common Vocabulary With the <strong>Tactical</strong> <strong>Edge</strong> Gateway<br />

Functionality Taxonomy ............................................................................................................... 21<br />

Appendix D: Acronym List .......................................................................................................... 22<br />

vi


List of Figures<br />

Figure 1. Common Vocabulary for TE Environments.................................................................... 3<br />

Figure 2. Using the Common Vocabulary to Characterize a Destroyer ......................................... 4<br />

Figure 3. Binning Platforms With Similar Constraints Into a Representative Class ...................... 5<br />

Figure 4. Harmonized <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ........................................................................... 6<br />

Figure 5. Non-Tailored <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> vs. Tailored for Special Operations Command<br />

......................................................................................................................................................... 7<br />

Figure 6. Accuracy of Design Patterns With the Tailored <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> ................... 9<br />

Figure 7. Applications of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> .............................................................. 10<br />

Figure 8. Main Page of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> Website ................................................... 14<br />

Figure 9. Using Web Architect to Find Tailored Guidance .......................................................... 15<br />

vii


1. Introduction<br />

Many approaches commonly used to develop Service-Oriented Environments (SOE) presume the<br />

availability of reliable, consistently available networks that provide significant bandwidth and<br />

little to no latency. Since this is often not the case across the Department of Defense’s (DoD)<br />

networks, current development methods might not provide reliable capabilities to users in a<br />

<strong>Tactical</strong> <strong>Edge</strong> (TE) environment 2 . This Enterprise Systems Engineering (ESE) Capstone activity<br />

aims to ensure the viability of an SOE to a broader domain of tactical users by gaining a better<br />

understanding of the TE and quantifying its characteristics.<br />

During Fiscal Year (FY) 2007, the ESE Capstone activity developed a <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

(TEF). The primary objectives of the TEF are to 1) provide a classification of disadvantaged<br />

users (i.e., users operating in a TE environment) and 2) to provide a common vocabulary to<br />

characterize TE environments. The common vocabulary allows the TE characteristics to be<br />

quantified and subsequently, solutions to be identified to explicitly address the constraints. As<br />

the DoD’s components deliver services to the TE, the TEF’s common vocabulary and use of<br />

consistent solutions (i.e., design patterns) will promote interoperability across componentspecific<br />

implementations.<br />

The results of this work are documented in two papers; “Common Vocabulary for <strong>Tactical</strong><br />

Environments,” which defines a common vocabulary that identifies classes of disadvantaged<br />

users at the TE and characterizes their environments as a set of constraints [2], and “Design<br />

Patterns for <strong>Tactical</strong> Environments,” which describes a set of repeatable solutions (i.e., design<br />

patterns) for the commonly occurring problems [3]. These design patterns define options to help<br />

mitigate the constraints at the TE and enable the delivery of services to users in constrained<br />

environments. The paper also documents infrastructure requirements and a reference<br />

implementation associated with the design patterns.<br />

The focus of the FY 2008 activity was to apply the TEF to DoD programs, while continuing to<br />

socialize and evolve the TEF and facilitate its transition to the DoD. The activity’s three major<br />

thrusts were to:<br />

Socialize the TEF across the DoD’s components and the components’ commands.<br />

Evolve the TEF, harmonize it with other representations of the TE, and validate it with<br />

the DoD’s components.<br />

Apply the TEF to tactical Programs of Record (PoR) across the DoD to demonstrate its<br />

value throughout the service acquisition lifecycle, including collecting users’<br />

requirements, documenting use cases, designing and developing services, and managing a<br />

portfolio of services at the TE.<br />

This paper is organized as follows: Section 2 of this paper provides an overview of the<br />

components of the TEF, including the common vocabulary and classes of TE environments.<br />

Section 3 describes how the TEF evolved in FY 2008, including the tailored versions developed<br />

2 <strong>Tactical</strong> <strong>Edge</strong> is defined by DISA as anything beyond the Defense Information Systems Network’s (DISN) Point-of Presence<br />

(PoP).<br />

2


for the Navy, Army, and Special Operation Forces. Section 4 details how the TEF was applied to<br />

provide guidance for the DoD’s programs by using the TEF to support the collection of users’<br />

requirements and use case documentation, the design and development of a service, and<br />

management of a portfolio of services at the TE. Section 5 provides an overview of the TEF<br />

website. Section 6 provides a summary of accomplishments and recommendations for advancing<br />

the delivery of services to the TE.<br />

2. The <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

The TEF provides a common vocabulary for identifying constraints at the TE. Employing these<br />

common terms allows one to recognize commonalities across the Services’ TE platforms. The<br />

FY 2007 work created the common vocabulary and identified a set of design patterns; the FY<br />

2008 work used the vocabulary and design patterns as the first essential step in applying the TEF<br />

to provide guidance across the DoD’s programs.<br />

2.1 Common Vocabulary<br />

The common vocabulary is a fundamental part of the TEF; it provides the building blocks for a<br />

user to characterize the TE environment. The common vocabulary consists of a set of attributes<br />

and possible values for the attributes. The attributes represent the constraints of the environment<br />

that are important to consider for the delivery of services to the TE. The TEF attributes<br />

characterize the network, system, physical environment, operational and security constraints.<br />

(See Figure 1.)<br />

Network Operational System<br />

Connectivity<br />

Bandwidth<br />

Latency<br />

Reliability<br />

Predictability<br />

Physical Environment Security<br />

Heating, Ventilation,<br />

and Air Conditioning<br />

(HV/AC)<br />

Lighting<br />

Hazards<br />

Repairability<br />

Decision Timelines<br />

Content<br />

System Training<br />

Confidentiality<br />

Integrity<br />

Availability<br />

Figure 1. Common Vocabulary for TE Environments<br />

3<br />

System Processing<br />

Storage<br />

Standard User Interface<br />

Ruggedness<br />

Size, Weight, & Power<br />

(SWaP)<br />

The common vocabulary can be used to describe the TE constraints. (See Figure 2.) Red, yellow,<br />

and green indicate the degree to which a particular value is a constraint; green represents<br />

minimal to no constraints, yellow represents moderate constraints, and red represents severe


constraints. The end result is a consistent characterization that can be used to compare<br />

constraints across the Services’ TE platforms.<br />

Figure 2. Using the Common Vocabulary to Characterize a Destroyer<br />

The common vocabulary of the TEF that was developed during the FY 2007 ESE Capstone<br />

activity was applied and verified during the FY 2008 ESE Capstone activity. In addition, during<br />

FY 2008, the vocabulary was aligned with authoritative definitions of terms from joint<br />

publications based on work completed by the Core Enterprise Services to the <strong>Tactical</strong> <strong>Edge</strong><br />

(CES2TE) Focus Group. The vocabulary is provided in Figure 1 and the authoritative definitions<br />

are provided in Appendix B. All definitions are from Joint Publication 1-02, Department of<br />

Defense Dictionary of Military and Associated Terms. As amended through May 30, 2008<br />

(http://www.dtic.mil/doctrine/jel/doddict).<br />

In addition to aligning the vocabulary with authoritative definitions from Joint Publication 1-02,<br />

the vocabulary can also be cross referenced with existing terms of reference, such as “<strong>Tactical</strong><br />

<strong>Edge</strong> Gateways Functional Taxonomy,” in Appendix C [1].<br />

2.2 Classes of <strong>Tactical</strong> <strong>Edge</strong> Environments<br />

Characterizing platforms using the TEF’s common vocabulary can help classify platforms that<br />

have similar constraints. When constraints are similar, rather than treating each platform<br />

individually, it is useful to define a representative set of classes in which to bin the platforms.<br />

(See Figure 3.) The classes of TE environments defined in the TEF provide the benefit of<br />

reducing the classification of TE platforms to a manageable set, which leads to reusable solutions<br />

across multiple platforms and DoD components. The classes of TE environments defined in the<br />

TEF are based on the analysis of use cases across the DoD to identify commonalities in the<br />

constraints of the TE environment. The class names and attribute values may be tailored to suit<br />

specific DoD components’ terms of reference and constraints.<br />

4


Figure 3. Binning Platforms With Similar Constraints Into a Representative Class<br />

3. Evolution of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

In FY 2008, one of the major thrusts was the evolution of the TEF. This evolution was the result<br />

of two primary activities: 1) harmonizing the TEF with the CENTCOM’s TE representation, and<br />

2) tailoring the TEF’s attribute values for particular DoD components.<br />

3.1 Harmonizing With the Central Command Representation<br />

The TEF was harmonized with findings from another effort described in the “Disadvantaged<br />

User” 3 white paper. The names of the classes of TE environments, the common vocabulary, and<br />

specific values were harmonized. Some key decisions that came from this harmonization process<br />

are documented in Appendix A.<br />

The results of the harmonization process are reflected in the TEF. The numerical values in the<br />

TEF are a result of combining the TEF’s values with CENTCOM’s values as defined in the<br />

“Disadvantaged User” white paper and then further iterating with Subject Matter Experts (SMEs)<br />

as described in Section 3.2. The TEF that resulted from this FY 2008 harmonization activity is<br />

shown in Figure 4. The rows represent the common vocabulary used to describe the constraints<br />

at the TE. Each column represents a unique class of TE environment. The colors define the<br />

3 http://communityshare.mitre.org/sites/g051/CENTCOM/Products/Forms/AllItems.aspx<br />

5


degree of constraints; green represents minimal to no constraints, yellow represents moderate<br />

constraints, and red represents severe constraints.<br />

Figure 4. Harmonized <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

3.2 Tailoring the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

Ideally, all of the military Services’ platforms fit nicely into one of the classes of TE<br />

environments defined in the TEF. In practice, while the majority of the platforms fit into one of<br />

the TEF’s classes of environments, the flexibility to tailor the TEF’s attribute values makes it<br />

more widely applicable. This need for flexibility was more noticeable after the FY 2008<br />

harmonization process; the TEF values transitioned from focusing on high-level text descriptions<br />

(e.g., good connectivity) to focusing on numerical values (e.g., 85-100% connectivity). There<br />

can be agreement by the military Services on high-level descriptions, but disagreement on<br />

numerical values. Tailoring the TEF means it can be applied to situations where a platform does<br />

not fit into one of the four classes of TE environments defined in the non-tailored TEF, while<br />

retaining the benefits of using a common vocabulary to describe the classes of TE environments.<br />

6


3.2.1 Process of Tailoring the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

While the common vocabulary remains constant (i.e., the attributes that characterize classes of<br />

TE environments do not change), a user can adjust the specific values of the attributes to better<br />

reflect their platforms. For extreme differences in values, the tailored values can essentially<br />

result in an entirely new class of TE environment. The process of tailoring the TEF involves<br />

engaging SMEs and finding authoritative documentation, if possible, to support the SMEs’<br />

recommendations.<br />

3.2.2 Results of Tailoring the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

The first tailored version of the TEF was created for Special Operations Command (SOCOM).<br />

Special Operations Forces are unique in that their operations require very good connectivity,<br />

plenty of bandwidth, and spare parts must be available. The SOCOM-specific TEF values<br />

include >99% connectivity (even for dismounted users) and up to two megabits of bandwidth per<br />

second for dismounted users. The majority of the tailored values were consistent with the nontailored<br />

TEF, which helped further validate the original values. The differences between the nontailored<br />

TEF and SOCOM’s tailored version are shown in Figure 5.<br />

Figure 5. Non-Tailored <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> vs. Tailored for Special<br />

Operations Command<br />

For the Navy, one of the major issues with the non-tailored TEF was that the majority of the<br />

Navy’s fleet straddled two categories (i.e., <strong>Tactical</strong> Mobile Center and Mobile Platform). As a<br />

result, a hybrid class of TE environment was created in the Navy’s tailored TEF, which included<br />

the characteristics of both classes of TE environments. The Navy’s hybrid class replaces the nontailored<br />

TEF’s Mobile Platform class. While the TEF’s vocabulary remained constant, the Navy-<br />

7


specific TEF was developed in coordination with Navy SMEs to better represent the Navy’s<br />

perspective.<br />

Finally, within the Army, one of the major extensions of the TEF was adding a new class to<br />

characterize unmanned systems, including a subclass for Tier 1 Unmanned Systems (e.g., small<br />

unmanned ground sensors) and another subclass for Tier 2 Unmanned Systems (e.g., medium-tolarge<br />

unmanned platforms, such as the Predator). The Army also updated the way in which the<br />

network was characterized from a Local Area Network/Wide Area Network distinction in the<br />

non-tailored TEF to specific communication architectures within and between TE environments.<br />

The differences between the Army’s tailored TEF and the non-tailored TEF were so significant<br />

that the additional Unmanned Aircraft Systems classes and the method of characterizing the<br />

network were not rolled up into the non-tailored TEF; however, we believe that incorporating<br />

these differences into the non-tailored TEF warrants further consideration as the TEF continues<br />

to evolve.<br />

For the Navy and Army, the tailored versions of the TEF continue to evolve. Current iterations<br />

are available on the TEF website, which is discussed in Section 5.<br />

3.2.3 Implications of Tailoring the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

Tailoring the values in the TEF can be problematic if solutions are mapped to entire TE<br />

environments (e.g., Mobile Platform). For example, consider a case where an existing chat<br />

service is operational in a Mobile Platform environment, which is characterized in the nontailored<br />

TEF as having moderate bandwidth and connectivity constraints. If the Mobile Platform<br />

environment is tailored so the bandwidth and connectivity are severely constrained rather than<br />

moderately constrained, the chat service might not work in the tailored Mobile Platform<br />

environment with severe constraints.<br />

This problem can be solved by mapping solutions to attributes rather than TE environments. If<br />

the chat service was mapped to moderate bandwidth and connectivity constraints rather than the<br />

Mobile Platform environment, the chat service would still be mapped to the moderately<br />

constrained non-tailored Mobile Platform environment; however, the chat service would no<br />

longer be mapped to the severely constrained tailored Mobile Platform environment. For an<br />

example, see Figure 6.<br />

As mentioned previously, the ability to apply the TEF to situations that do not perfectly match<br />

the non-tailored TEF environments increases the TEF’s applicability to a larger audience and<br />

solutions can accurately be mapped to any TE environment as long as it is described using the<br />

common vocabulary.<br />

8


Figure 6. Accuracy of Design Patterns With the Tailored <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

4. Applications of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

To validate the TEF and support adoption, the TEF was applied to multiple DoD programs to<br />

demonstrate the TEF’s contributions to realize services at the TE. This section describes the<br />

TEF’s applicability throughout the service’s acquisition lifecycle, including collecting users’<br />

requirements, documenting use cases, designing and developing a service, and managing a<br />

portfolio of services at the TE. (See Figure 7.)<br />

9


A<br />

p<br />

p<br />

l<br />

y<br />

T<br />

E<br />

F<br />

Identify performance measures and outcomes, metrics<br />

Mission Threads/Use Cases<br />

2) Model mission threads in BPMN, map actors to TEF<br />

environments<br />

Core Enterprise Services<br />

• M2M Messaging<br />

• Mediation<br />

• Security Service<br />

• Service Discovery<br />

• Collaboration<br />

• Content Delivery<br />

• Content Discovery<br />

• People Discovery<br />

• ESM<br />

4.1 Collect User Requirements<br />

Joint Capability Areas (JCAs)<br />

1) Collect user requirements based on identified capability gaps<br />

Technology<br />

(standards)<br />

6) Support service acquisition<br />

-Identify industry standards for edge networking<br />

-Identify technical standards/specification for deploying services<br />

-Identify DoD/industry standards for data formats<br />

Figure 7. Applications of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

In the process of defining strategic roadmaps, it is important to start by determining users’ needs,<br />

defining the strategic goals for capability development, and using this information to identify<br />

capability gaps. While some capability gaps can emerge from the portfolio management<br />

processes, interviewing users is also a key component of identifying capability gaps and<br />

collecting requirements for future capabilities. The TEF can be utilized in this process to identify<br />

capability gaps by asking end-users about their functional operational needs, documenting<br />

mission threads (e.g., how they accomplish their tasks), and by inquiring about their TE<br />

environment’s constraints using the TEF’s common vocabulary and attribute values as guidance.<br />

(See Figure 7, Step 1.) This results in capturing end-user requirements in the context of the<br />

constraints of the environment. Once the necessary functions are identified for specific<br />

constrained environments, identifying where current or planned solutions might be inadequate<br />

becomes evident as TEF guidance, which includes a set of design patterns that are useful for<br />

specific environments. In this manner, capability gaps are flagged and can be documented (i.e.,<br />

where current or planned services do not intersect with recommended guidance).<br />

As an example, the TEF was employed by SOCOM’s <strong>Tactical</strong> Local Area Network team during<br />

interviews with users at <strong>Tactical</strong> Special Operations Centers (TSOCs), including Special<br />

10<br />

Design Patterns /mission thread decomposition<br />

4) Identify services based on<br />

applicable TEF environment values<br />

and identified patterns<br />

Data<br />

3) Decompose mission threads<br />

and identify design patterns<br />

Services<br />

5) Identify technology standards and<br />

best practices<br />

- SLA<br />

- Rules<br />

- Policy


Operations Command, South and Special Operations Command, Central. Prior to the interviews<br />

at TSOCs, questions were formulated that included queries about the TE environment and<br />

environment-specific attributes as defined by TEF. With these questions, the interviewers<br />

collected functional requirements and usage patterns that can feed into use cases related to<br />

specific TE environments. Including questions about the TEF’s attributes in the interview<br />

process also helped validate the TEF with the SOCOM community.<br />

4.2 Develop Mission Threads<br />

Using the capability gaps and user requirements as a starting point, the next step is to document<br />

use cases through the development of mission threads, which in essence defines the Concept of<br />

Operations of the needed capability. Mission threads can include interaction patterns between<br />

actors. The actors in a TE mission thread can be characterized by using the TEF’s common<br />

vocabulary and binning the actors into one of the four classes of TE environments (i.e., <strong>Tactical</strong><br />

Fixed Center, <strong>Tactical</strong> Mobile Center, Mobile Platform, and Dismounted User). This is the<br />

equivalent of mapping each swim lane in a Business Process Modeling Notation 4 process flow<br />

diagram to the applicable TE environment. (See Figure 7, Step 2.) The benefit of this alignment<br />

is that it identifies the constraints that need to be taken into account within and across multiple<br />

classes of TE environments.<br />

For example, the Core Enterprise Services to the <strong>Tactical</strong> <strong>Edge</strong> (CESTE) Focus Group is using<br />

the TEF to develop reference models for the DoD Chief Information Officer’s (CIO)<br />

organization. The TEF was used by the CESTE Focus Group to map actors in a Joint Close Air<br />

Support (JCAS) scenario to the TEF’s classes of TE environments. This mapping was used as<br />

part of identifying the Business Reference Model’s content for the JCAS’ architecture. Once this<br />

mapping was complete, the TEF vocabulary and the attribute values for each class of TE<br />

environment of the JCAS’ actors were immediately available for use as non-functional<br />

performance metrics. The values were employed as metric constrains and were used to define<br />

and populate the Performance Reference Model for the JCAS’ architecture.<br />

4.3 Identify Design Patterns<br />

Aligning mission threads with the TEF allows one to identify applicable design patterns and<br />

other guidance, which enables the delivery of effective services to support the mission threads.<br />

Design patterns are first associated with the TEF’s attribute constraints that they can help<br />

mitigate [3]. (See Appendix C.) For example, a design pattern can be associated with intermittent<br />

connectivity and low bandwidth. Services are aligned with the TEF’s classes of environments in<br />

which they were designed to function. (See Figure 7, Step 3.)<br />

For example, the TEF was used by the Net-Enabled Command Capability (NECC) program to<br />

characterize Disconnected, Intermittent, and Limited (DIL) environments and define the<br />

interface between the Global Information Grid Computing Nodes (GCN), including enterprise<br />

GCNs (e.g., Defense Information Systems Agency’s [DISA] Enterprise Computing Center) and<br />

local GCNs (e.g., DIL environments).<br />

4 Business Process Modeling Notation, as defined by the Object Management Group .<br />

11


MITRE recommended an adaptation of the common vocabulary to characterize NECC’s local<br />

GCNs in order to differentiate between the classes of local GCNs from those of enterprise<br />

GCMs, and to further tailor the solution sets being developed for the local GCNs to differentiate<br />

them from those being adopted for enterprise GCNs. These recommendations are documented in<br />

the paper, “NECC Disconnected, Intermittent, Low Bandwidth Requirements and Architectural<br />

Approaches” (NECC Disconnected, Intermittent, Low Bandwidth Requirements and<br />

Architectural Approaches 2008). In addition, NECC’s Architecture <strong>Framework</strong> document<br />

adopted the DIL characterization in its definition of the operational environment [5].<br />

4.4 Identify Services<br />

Aligning a mission thread’s actors with the applicable TEF class of environment allows for the<br />

identification of services and design patterns that provide options to help in mitigating the<br />

constraints for a particular TE mission thread. The design patterns can then be incorporated into<br />

service specifications to ensure that the results can provide the needed capabilities given the<br />

constraints of the classes of TE environments. In addition, aligning service solutions to the TEF<br />

(i.e., mapping service solutions to the classes of TE environments in which they currently, or are<br />

intended to, operate) allows Portfolio Managers (PMs) to assess the existing portfolio to<br />

determine if a newly identified capability need can be met with existing solutions, and if such<br />

solutions will support use in the intended TE environment. In other words, mapping services to<br />

TEF classes of environments allows PMs to look across an existing portfolio of services and<br />

COTS tools to identify existing solutions built with the necessary underlying assumptions about<br />

constraints. (See Figure 7, Step 4.) The TEF classes of environments allow for comparisons<br />

across DoD components and various types of TE platforms that otherwise can have appeared as<br />

distinct entities.<br />

For example, under the CESTE Focus Group, CES were identified from the information flows<br />

modeled in the JCAS scenario. The TEF’s design patterns were then used to identify specific<br />

service tailoring needed for each JCAS actor, as required by their class of TE environment. This<br />

mapping was used to define the Service Reference Model and identify required services for the<br />

JCAS architecture.<br />

4.5 Identify Technology Standards and Best Practices<br />

Best practices and standards are a crucial enabler of interoperable systems because they promote<br />

a reasonable degree of consistency across service implementations. One challenge in employing<br />

this guidance is determining what is applicable; it is often difficult to identify the specific<br />

guidance that applies to a particular situation. For example, a developer might focus on defining<br />

a data staging strategy for users who have connectivity only 10-40% of the time. The TEF can be<br />

used to organize best practices and standards for developers. Within the TEF, mapping the<br />

classes of TE environments to the best practices and standards organizes the guidance so it can<br />

be navigated by a particular TE environment or constraint. (See Figure 7, Step 5.) The TEF<br />

allows developers to identify specific guidance based on a particular context (e.g., user interfaces<br />

for dismounted users). The guidance can also be tailored to address a particular challenge in a TE<br />

environment. The intent is to provide a TE perspective on the multiple volumes of guidance so a<br />

user developing services for the TE can employ the TEF to navigate through the material and<br />

identify relevant and possibly tailored guidance. The guidance is aligned with the constraints of<br />

12


the TE environment to support binning the guidance by the constraints as well as clustering it by<br />

the classes of TE environments.<br />

For example, this approach is being employed by Net-Centric Enterprise Solutions for<br />

Interoperability (NESI), specifically within NESI’s Part 4 on Node Guidance. The TEF was used<br />

to define operational environment characteristics for the Global Information Grid’s core and the<br />

TE; the common vocabulary was used to define criteria so relevant guidance and best practices<br />

for implementing the node capabilities within NESI can be specified for each operational<br />

environment.<br />

4.6 Support Service Acquisition<br />

A challenge with acquiring systems for the TE is identifying quantifiable criteria to assess the<br />

readiness of the systems that will operate within TE environments. Aligning mission threads to<br />

the TEF provides a means to characterize the constraints of the classes of TE environments using<br />

a common vocabulary and to derive the non-functional requirements that can be part of a<br />

Request for Proposal (RFP). (See Figure 7, Step 6.) These non-functional requirements<br />

characterize the unique considerations of each TE environment in which the system will be<br />

deployed. The TEF also provides a common means to assess bidder’s submissions. In the<br />

proposal creation process, bidders can describe the classes of TE environments for which their<br />

solutions will provide capabilities and align them to the non-functional requirements in the RFP.<br />

This simplifies the proposal evaluation process by grouping the proposed services into a<br />

common set of bins to characterize and assess the proposals. Furthermore, quantifying the<br />

constraints of the TE environments through common attribute values helps identify design<br />

patterns against which the proposed solutions can be compared.<br />

4.7 Support Portfolio management<br />

To support portfolio management, the CESTE Focus Group will deliver a plan to explore issues<br />

associated with the deployment of services at the TE, a set of reference models, and departmental<br />

guidance for delivering Core Enterprise Services to and throughout the TE. The value of<br />

applying the TEF to the reference models’ development is the TEF’s common vocabulary (i.e.,<br />

set of attributes) characterize different aspects of the classes of TE environments and provides<br />

the basis for an initial service and performance TE ontology.<br />

5. <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> Website<br />

As shown in the examples in Section 4, the TEF can be applied throughout the process of<br />

analyzing, designing, and developing TE services. To encourage the adoption and re-use of the<br />

TEF, the FY 2008 ESE Capstone activity’s products were posted on an interactive website. (See<br />

Figure 8.) The website is currently available on MITRE’s internal network<br />

(http://calypso.mitre.org/tacticaledgeframework) and it can be accessed at a secure external<br />

website for both government and MITRE access<br />

(https://yukon2.mitre.org/tacticaledgeframework/).<br />

13


Figure 8. Main Page of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> Website<br />

The main page provides an overview of the TEF, describing why it was developed and what it<br />

can be used for. From the main page, users can access the latest version of the TEF, design<br />

patterns, existing services, and examples of TE use cases. These features allow MITRE to<br />

provide the most up-to-date tailored versions of the TEF, an overview of the existing services<br />

that were designed to work in the TEF’s classes of environments, and access to a significant<br />

repository of cutting-edge design patterns intended to overcome common constraints at the TE.<br />

In addition to finding content, users can also contribute content to the website. We hope the<br />

website’s content will become richer and more expansive as awareness of the website increases<br />

and government users add to it. After a user is approved for an account, he or she can:<br />

Add use cases that describe user requirements and TE constraints.<br />

Add design patterns and associate them with the TEF’s common vocabulary.<br />

Add services and bin them by the type of TE environment in which they are intended to<br />

function.<br />

As users contribute and search for content, they are essentially using processes similar to those<br />

used by MITRE’s ESE Capstone activity team in applying the TEF in FY 2008 (i.e., capturing<br />

user requirements, identifying design patterns to overcome constraints, and consolidating the<br />

services designed to work in the TEF’s classes of environments).<br />

An additional feature provides a powerful method to search for relevant design patterns. Using<br />

the Web Architect model, users can choose specific classes of TE environments and attributes<br />

from the TEF and tailor the constraints to match their classes of TE environments, to retrieve the<br />

most accurate results for a specific TE environment. (See Figure 9.)<br />

14


Figure 9. Using Web Architect to Find Tailored Guidance<br />

In the future, we hope the TEF website will enable users of the TEF to more readily capture TE<br />

users’ requirements, identify design patterns to overcome TE constraints, consolidate TE<br />

services, and more.<br />

6. Conclusions and Recommendations<br />

The primary objective of the TEF is to provide a common vocabulary to characterize TE<br />

environments so the TE characteristics can be quantified and solutions can be identified to<br />

explicitly address them. Subsequently, as the DoD’s components deliver services to the TE, the<br />

TEF’s common vocabulary and use of consistent design patterns will promote interoperability<br />

across component-specific implementations.<br />

To support this objective, the focus of MITRE’s ESE Capstone activity in FY 2008 was to<br />

socialize the TEF and facilitate its transition to the DoD. The socialization of the TEF across the<br />

DoD’s components and the component’s commands resulted in the validation and evolution of<br />

the TEF.<br />

Another focus of the FY 2008 activity was to apply the TEF across multiple DoD programs to<br />

demonstrate its value. This resulted in the initial adoption of the TEF across several DoD<br />

programs. Along with this progress toward the bottom-up adoption of the TEF, it is imperative<br />

that the use of the TEF and its common vocabulary be further institutionalized at a departmental<br />

level. In support of this, we recommend the following:<br />

Joint Staff and doctrinal leads from the components should adopt the TEF to establish<br />

DoD-wide definitions for the classes of TE environments and use the TEF’s common<br />

vocabulary to characterize them.<br />

15


The DoD CIO and the Net-Centric (NC), Command and Control, and Battlespace<br />

Awareness Capability PMs should employ the TEF to define Service and Performance<br />

Reference Models in order to establish an NC Enterprise Architecture.<br />

DISA’s Net-Centric Enterprise Services and NECC, in conjunction with the Servicespecific<br />

PoR developing enterprise services (e.g., Navy Consolidated Afloat Networks<br />

and Enterprise Services, Army System-Of-Systems Common Operating Environment,<br />

Marine Corps Enterprise Information Technology Services, and Air Force Air and Space<br />

Operations Center as a Weapon System) should use the TEF to define and document<br />

interfaces and design patterns to achieve federation and meet Quality of Service<br />

requirements across Service-specific TE platforms.<br />

The adoption of a common characterization of the TE and the use of consistent design patterns<br />

across the DoD will minimize architectural differences across the DoD’s components and<br />

promote interoperability across component-specific service implementations at the TE.<br />

7. References<br />

1. Dally, K. et al.,"<strong>Tactical</strong> <strong>Edge</strong> Gateway Functional Taxonomy," October 2007, ESE<br />

Capstone Product, The MITRE Corporation, MTR 070286.<br />

2. Dandashi, F. et al., "<strong>Tactical</strong> <strong>Edge</strong> <strong>Characterization</strong> <strong>Framework</strong>, <strong>Volume</strong> 1: Common<br />

Vocabulary for <strong>Tactical</strong> Environments," November 2007, ESE Capstone Product, The<br />

MITRE Corporation, MTR 070331.<br />

3. Dandashi, F. et al., "<strong>Tactical</strong> <strong>Edge</strong> <strong>Characterization</strong> <strong>Framework</strong>, <strong>Volume</strong> 2: Design<br />

Patterns for <strong>Tactical</strong> Environments," September 2007, ESE Capstone Product, The<br />

MITRE Corporation, MTR 070326.<br />

4. Net-Enabled Command Capability, "NECC Disconnected, Intermittent, Low Bandwidth<br />

Requirements and Architectural Approaches," 2008.<br />

5. Net-Enabled Command Capability, "NECC Software Architecture <strong>Framework</strong>, Software<br />

and Physical Views," 2008.<br />

16


Appendix A: Harmonization of the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> and<br />

Central Command’s “Disadvantaged User” White Paper<br />

Class names were merged:<br />

o <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong>’s (TEF’s) “fixed center” and Central Command’s<br />

(CENTCOM) “tactical fixed” became “tactical fixed center.”<br />

o TEF’s “mobile center” and CENTCOM’s “tactical semi-fixed” became “tactical<br />

mobile center.”<br />

o TEF’s “mobile swarm” and CENTCOM’s “mobile (mounted and maritime)”<br />

became “mounted user.” [Note: After the harmonization process, this class was<br />

renamed “mobile platform.”]<br />

o TEF’s “dismounted” and CENTCOM’s “mobile-dismounted” became<br />

“dismounted user.”<br />

High-level categories were merged:<br />

o TEF categories: network, resource, user interface, and security threats.<br />

o CENTCOM categories: physical and environment, communications, and<br />

operational/other.<br />

o Harmonized categories: network, system, environment, operational, and security.<br />

Attribute values were merged:<br />

o TEF values: general characterization (e.g., high, medium, and low).<br />

o CENTCOM values: specific values.<br />

o Harmonized values: described as a range between two specific values.<br />

Standard terms of reference were replaced with unofficial attribute names:<br />

o Size, Weight, and Power terminology was used.<br />

o Confidentiality, Integrity, and Availability terminology was used in the security<br />

category.<br />

o CENTCOM’s spectral environment attribute was combined with TEF’s<br />

predictability attribute.<br />

o Heating, Ventilation, and Air Conditioning and environmental constraints<br />

remained because Special Operations Command considered them to be important<br />

issues. The Communications Architecture column from CENTCOM’s TEF (i.e.,<br />

wideband satellite communications, cable, fiber, wireless, etc.) was adequately<br />

captured by the Local Area Network/Wide Area Network (LAN/WAN) aspects in<br />

the harmonized TEF. It was noted that line-of-site can be a point-to-point<br />

connection that does not have a LAN/WAN interface.<br />

17


Appendix B: Authoritative Definitions of Common Vocabulary Terms<br />

Network<br />

System<br />

Connectivity: “The ability to exchange information by electronic means.” The <strong>Tactical</strong><br />

<strong>Edge</strong> <strong>Framework</strong> (TEF) measures connectivity using the frequency with which the<br />

network is available. This can be quantified as a percentage of time when connectivity is<br />

available.<br />

Bandwidth: “The difference between the limiting frequencies of a continuous frequency<br />

band expressed in hertz (i.e., cycles per second). The term bandwidth is also loosely used<br />

to refer to the rate at which data can be transmitted over a given communications circuit.<br />

In the latter usage, bandwidth is usually expressed in either kilobits per second or<br />

megabits per second.” The TEF measures bandwidth in kilobits or megabits per second.<br />

Latency: Definition not in Joint Publication 1-02. The TEF uses latency to mean the<br />

amount of time it takes a packet of data to travel from one point to another in a network.<br />

It is measured in milliseconds.<br />

Reliability: Definition not in Joint Publication 1-02. The TEF uses reliability to indicate<br />

whether the delivery of a message in a network is guaranteed or not. It is measured as the<br />

percent of time the delivery is guaranteed. A lack of reliability can Result from a<br />

resource’s failure or packet loss.<br />

Predictability: Definition not in Joint Publication 1-02. The TEF uses predictability to<br />

mean the degree that the network environment can be anticipated (e.g., spectral<br />

environment, delivery of messages, security threats, lighting constraints, etc.) at any<br />

given time. A discrete value of predictable, mostly predictable, less predictable, or<br />

unpredictable is used in the TEF to indicate predictability.<br />

System Processing: “A system of operations designed to convert raw data into useful<br />

information.” The TEF provides a measure of processing power by binning processing<br />

power into handheld, single workstation, multiple workstations, or servers. A more<br />

specific measurement can be the rate at which a computing device performs operations,<br />

(i.e., the clock rate [speed] of the Central Processing Unit).<br />

Storage: “A device consisting of electronic, electrostatic, electrical, hardware or other<br />

elements into which data may be entered, and from which data may be obtained as<br />

desired.” The TEF provides a measure of storage by binning storage into handheld<br />

memory, single data storage device, and large data storage device. A more specific<br />

measurement can be gigabytes.<br />

Standard User Interface (SUI): Definition not in Joint Publication 1-02. The TEF uses<br />

SUI to mean the type of device being used and the corresponding standard style of the<br />

user interface for the device. The TEF bins SUI into handheld, tablet, laptop, and<br />

desktop.<br />

Ruggedness: Definition not in Joint Publication 1-02. The TEF uses ruggedness to mean<br />

a device’s ability to survive the environment’s hazards. The TEF bins ruggedness into the<br />

number of environmental constraints that a device needs to withstand (i.e., few, some,<br />

and many ruggedness considerations).<br />

18


Size: 1) "Available Payload: The passenger and/or cargo capacity expressed in weight<br />

and/or space available to the user." Or 2) "Man Portable: Capable of being carried by one<br />

man. Specifically, the term may be used to qualify: 1. Items designed to be carried as an<br />

integral part of individual, crew-served, or team equipment of the dismounted soldier in<br />

conjunction with assigned duties. Upper weight limit: approximately 14 kilograms (31<br />

pounds.) 2. In land warfare, equipment that can be carried by one man over long distance<br />

without serious degradation of the performance of normal duties." The TEF bins size into<br />


Security<br />

meaning is or might be assigned.” The TEF measures data complexity by binning it into<br />

complex, intermediate, and simplified.<br />

System Training: Definition not in Joint Publication 1-02. The TEF uses system training<br />

to mean the amount of training a user receives on how to use the application, which is a<br />

combination of the length and type of training and the frequency of use. System training<br />

is binned into minimal, intermediate, and extensive.<br />

Information Assurance (IA): “Measures that protect and defend information and<br />

information systems by ensuring their availability, integrity, authentication,<br />

confidentiality, and non-repudiation.” This includes providing for the restoration of<br />

information systems by incorporating protection, detection, and reaction capabilities.<br />

Confidentiality: Definition not in Joint Publication 1-02. The TEF uses confidentiality to<br />

mean assurance that information is not disclosed to unauthorized persons, processes, or<br />

devices. The TEF provides a list of the most common types of risks to confidentiality in<br />

each environment.<br />

Integrity: Definition not in Joint Publication 1-02. The TEF uses integrity to mean the<br />

quality of an information system reflecting the logical correctness and reliability of the<br />

operating system, the logical completeness of the hardware and software implementing<br />

the protection mechanisms, and the consistency of the data structures and occurrences of<br />

the stored data. In a formal security mode, integrity can be interpreted more narrowly to<br />

mean protection against unauthorized modification or the destruction of information. The<br />

TEF provides a list of the most common types of risks to integrity in each environment.<br />

Availability: Definition not in Joint Publication 1-02. The TEF uses availability to mean<br />

timely, reliable access to data and information services for authorized users. The TEF<br />

provides a list of the most common types of security risks to availability in each<br />

environment.<br />

All definitions in quotations are from Joint Publication 1-02, Department of Defense Dictionary<br />

of Military and Associated Terms. As amended through 30 May 2008<br />

(http://www.dtic.mil/doctrine/jel/doddict).<br />

20


Appendix C: Cross Referencing Common Vocabulary With the <strong>Tactical</strong><br />

<strong>Edge</strong> Gateway Functionality Taxonomy<br />

The following are approximate mappings from the <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong> to the <strong>Tactical</strong><br />

<strong>Edge</strong> Gateways Functional Taxonomy [1]:<br />

Bandwidth – Capacity<br />

Reliability – Signal, Statistical Availability<br />

Predictability – Station Time<br />

Confidentiality – Access<br />

Integrity – Traffic<br />

Availability – Threat Survivability<br />

Storage – Storage<br />

Size, Weight, and Power (SWaP) – SWaP Suitability, Existing Payloads<br />

Network and Security category attributes – Operational Enabling attributes<br />

System, Environment, and Operational category attributes – Operational Fit attributes<br />

TEF classes – Gateway Platforms.<br />

21


Appendix D: Acronym List<br />

CENTCOM Central Command<br />

CES2TE Core Enterprise Services to the <strong>Tactical</strong> <strong>Edge</strong><br />

CIO Chief Information Officer<br />

COTS Commercial Off-the-Shelf<br />

CPMO Component Program Management Office<br />

DIL Disconnected, Intermittent, and Limited<br />

DoD Department of Defense<br />

ECU Environmental Control Unit<br />

ESE Enterprise Systems Engineering<br />

FY Fiscal Year<br />

GCN Grid Computing Node<br />

HVAC Heating, Ventilation, and Air Conditioning<br />

IA Information Assurance<br />

LAN Local Area Network<br />

NC Net-Centric<br />

NECC Net-Enabled Command Capability<br />

NESI Net-Centric Enterprise Solutions for Interoperability<br />

PoR Programs of Record<br />

RFP Request for Proposal<br />

SME Subject Matter Experts<br />

SOCOM Special Operations Command<br />

22


SOE Service-Oriented Environment<br />

SUI Standard User Interface<br />

TE <strong>Tactical</strong> <strong>Edge</strong><br />

TEF <strong>Tactical</strong> <strong>Edge</strong> <strong>Framework</strong><br />

TSOC <strong>Tactical</strong> Special Operations Centers<br />

WAN Wide Area Network<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!